2020-02-17: Coronavirus: Armed robbers steal hundreds of toilet rolls in Hong Kong
2020-02-17: Pokemon Go abusing filesystem access permissions again, now to detect the presence of a TWRP folder and then lock you out



Securing Splunkweb (Free version) -- THIS WORKS


Metasploit Cheat Sheet - Comparitech


HOW TO EXTRACT AN API KEY FROM A MOBILE APP BY STATIC BINARY ANALYSIS


Keyfinder is a tool that let you find keys while surfing the web!


ccdc/linux at master � traviskp/ccdc


Scientists Crack Longest Encryption Key Ever--795 bits (Dec 2019)


F-1 Curricular Practical T raining (CPT) Request Form -- Required for International Students in CNIT 197 or 198 (Dec. 17, 2018)


Ch 3a: Top 10 Governance, Risk and Compliance (GRC) Vendors


WRCCDC
-->


2020-02-12: %u200ECYBER on Apple Podcasts


DKIM, SPF, and Spam Assassin Validator
Ch 4b: Load Balancing With Round Robin DNS


Evidence Acquisition and Analysis from iCloud


Ch 9b: Snort: Re: Rule for detecting ssh


How to Install WAMP


2020-02-03: CISSP Certification Cheat Sheet, Study Guides & Best Courses


Bochs Hacking Guide


Linux Kernel ROP - Ropping your way to # (Part 1) | Trustwave | SpiderLabs | Trustwave


NIST SPECIAL PUBLICATION 1800-26 Data Integrity Detecting and Responding to Ransomware and Other Destructive Events


Ch 3a: Top 10 Governance, Risk and Compliance (GRC) Vendors



1-31-19: 160 added
11-6-19: Twitter text placed in field